Mobile surveillance

Door security solutions involve more than just the product being deployed – they also include the impact a solution can have and the support available throughout the life of the installation. While ASSA ABLOY sustainable solutions contribute a number of impressive sustainability benefits, the support for architects, designers, integrators and other security professionals is also robust.
ASSA ABLOY sustainable solutions
Efficient and cost-effective building design requires everyone to be...

FLIR Systems, Inc. has announced FLIR TruWITNESS, an industry-first wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organisations to reach a new level of situational awareness.
TruWITNESS wearable sensor platform
TruWITNESS is designed for any public safety organisation that requires on-scene, real-time mobil...

Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations.
IX2 IP intercom and security solution
“With no server or licence fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt...

Soliton Systems has been named as the winner of the Airbus Critical Apps Challenge Belgium at the recent Astrid event in Brussels. With their new Zao Android App, Soliton has developed an encrypted live streaming video app that can operate on the new Airbus Tactilon Dabat device.
Airbus is a pioneer in aeronautics, space and related services with their Defence and Space group as innovators in providing secure communication devices for government agencies that include emergency services. The Tac...

Sensory, a provider of speech and vision technologies that enhance the user experience and security of consumer electronics, announces the release of its fourth generation of TrulySecure FIDO Certified multimodal biometric authentication technology. Now smarter, faster and more secure than ever before, the TrulySecure 4.0 SDK boasts a variety of new AI features that cater to today’s smartphones, mobile apps, and IoT devices, including support for 3D cameras, GPU utilisation for authenticat...

Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces that the company has been recognised as one of the private technology startups in the elite 2018 Red Herring Top 100 Global ranking.
“With the pervasiveness of mobile, IoT and cloud, assuring protected access to applications and sensitive information is a key challenge for IT organisations of all sizes. This is exactly the problem that Pulse Secure has addressed with its portfolio of...

News

Pulse Secure, global provider of Secure Access solutions to both enterprises and service providers, has announced the launch of new packaging of its award-winning Pulse Access Suite for Managed Security Service Providers (MSSPs). The solution offers service providers an accelerated, cost-effective means to differentiate and build out their service portfolio to meet the massive demand for protected connectivity to cloud applications and hybrid IT resources.
Pulse Secure
Pulse Secure offers a comprehensive, integrated and highly interoperable set of Secure Access solutions spanning remote, mobile and cloud access security; network visibility and access control; and application delivery. The suite allows service providers to extend lucrative access protection, endpoint compliance, threat response and availability services for the data center, hosted in the cloud or running as SaaS.
The service provider packaging optimises capital expenditure through an on-demand, pay-per-use model. MSSPs can spin up or spin down virtual Secure Access instances and licenses at a cost based on the number of concurrent monthly users. On-demand provisioning and tiered, user-based pricing gives service providers needed flexibility for customer onboarding, growth spurts and business downturns.
Managed Security Services (MSS) The Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market'
According to a recent Gartner report1, the Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market , generating $18.7 billion in revenue in 2017 and growing at a CAGR of 11 percent through 2021. It is important to view MSS in the context of broader security outsourcing, because large enterprises are increasingly looking for hybrid engagements that include a mix of shared and dedicated service delivery components.' Key market trends in that report include:
Moving beyond monitoring of only network-based security technologies, particularly the network perimeter, with increasing focus on the endpoint (e.g. managed EDR services)
Increasing movement toward more customised outcomes for buyers
Buyer demand for capabilities to monitor popular SaaS applications, and public cloud service providers and IaaS
Enterprise Mobile Management (EMM) and Network Access Control (NAC)
As enterprises are seeking more complete offerings from fewer managed security service providers, MSSPs in turn are seeking to expand service scope while reducing business risk and operational complexity. In comparison to working with point solutions that are limited due to custom integration, disparate management and licensing constraints, Pulse Secure uniquely offers MSSPs integrated Virtual Private Network (VPN), Enterprise Mobile Management (EMM), Network Access Control (NAC) and virtual Application Delivery Controller (ADC) solutions within a unified management framework for data center and hybrid IT implementation.
Pulse Secure Access Suite for MSSPs
MSSP packaging, including user-based licensing, will be available to authorised channel partners at the end of November through Pulse Secure’s global distributors
MSSP packaging, including user-based licensing, will be available to authorised channel partners at the end of November through Pulse Secure’s global distributors. The Pulse Secure Access Suite for MSSPs’ list price starts at $6 USD MSRP per concurrent user per month for the first 500 users with higher discounts available for larger user counts. The solution includes a multi-tenant, centralised management system and licensing server that gives MSSPs operational oversight while also providing clients with dashboard visibility. The solution includes virtual appliance form factors for VMware, KVM and Hyper-V, and supports deployment in hosted cloud environments such as Microsoft Azure and Amazon AWS.
“Ensuring secure access is more challenging than ever given the dynamics of cyber threats, IT consumerisation and software-defined data centers. Enterprises of all sizes are overwhelmed and increasingly looking to MSSPs for expertise and capacity,” said Scott Gordon, chief marketing officer at Pulse Secure. “Pulse Secure gives MSSP leaders an easy, proven and no-risk path to extend services and increase revenues for hybrid IT secure access. More importantly, our new MSSP packaging enables our service provider partners and their customers to deliver ubiquitous access productivity while ensuring compliance.”
Managed Access Services
“Pulse Secure has been a key vendor for our managed access services. In my team’s experience, Pulse is the only one that has reliably delivered as-advertised stability, performance and manageability, as well as new feature sets that satisfy our highly demanding clients,” said Nicholas Klein, SOC supervisor at GTT Managed Secure Access Group. “With Pulse Secure, our services are backed by a rock-solid, flexible platform paired with a responsive support team, allowing us to focus on the value-add aspects of our managed service for our customers.”
“As business, government and educational institutions are building out their cloud-enabled infrastructure, enterprises must consider how to enforce appropriate resource and data access while delivering high usability for their users. indevis offers enterprises the benefit of expertise, resources, and experience to design and implement an integrated data center and cloud access strategy,” said Wolfgang Kurz, founder and CTO at indevis. “We believe Pulse Secure offers a breadth of Secure Access capabilities and interoperability that give our customers greater freedom to optimize and defend their mobile and cloud computing initiatives. We appreciate the operational and licensing advantages that the Pulse Secure packaging provides our customers and us.”
Internet of Enterprises Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data"
“Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data. We are at the core of our customers’ data journey,” said Nicolas Drogou, head of Orange Cyberdefense APAC. “Ensuring the security of the data and its journey end to end is paramount to us being the trusted partner for their Digital Transformation. Pulse Secure is a cornerstone solution within our managed security services suite. The features and scalability of its Secure Access suite enable us to tackle the complex Secure Access challenges that organizations face in an increasingly volatile threat landscape.”
“RKON’s customers are building out significant mobile and cloud investments where potential exposure to cyberattacks, compliance and visibility gaps are top of mind,” said Jeff Mullarkey, CEO of RKON, a leading-edge MSSP based in Chicago.
He further added, “Ensuring always-on and protected access to resources is foundational to their businesses. We support enterprises across all verticals with a specific emphasis in the mergers and acquisitions space. Our Managed Secure Access practice leverages the Pulse Secure platform's reliability and broad capabilities.”

A dependable Internet connection is virtually every industry’s sustenance and without it, business dies. Yet many don’t realise how frequently the worst occurs, or how dramatically it could impact their livelihood. According to industry research, network downtime can cost small and midsize businesses (SMBs) anywhere from $5,600 per minute, to between $8,600 and $74,000 an hour. Whether it’s business continuity for users in retail/point-of-sale (POS), construction, banking, insurance, restaurants and hospitality, or its primary connectivity for end users in utilities, transportation, security, municipalities, kiosks, ATMs and digital signage, in addition to the financial drain, IT failures have far-reaching repercussions that can result in permanent client loss, missed deadlines, devalued brands and more.
Fleet management and asset tracking SensLynx Seamless Failover automatically rescues lost primary wired or broadband connections to maintain business continuity
Though many backup options exist, most are complex or costly, and almost none provide a complete and easy to set up solution. SensLynx, widely known for its popular fleet and asset tracking program, painstakingly designed its new suite of seamless IoT solutions to fill this void. Their integrated plug-and-play bundle comes with everything needed to prevent interruption including software, hardware and connectivity, plus fully managed services and monitoring built-in through their cloud manager services, all wrapped up in one low monthly rate.
SensLynx Seamless Failover automatically rescues lost primary wired or broadband connections to maintain business continuity. SensLynx Seamless LTE almost instantly deploys primary connectivity to new or temporary (pop-up) locations, while also functioning as a backup or secondary connection. Its applications encompass trade shows, oil and gas remote monitoring, in-vehicle, mobile or portable uses, disaster recovery and every other primary connectivity category. Both solutions are feature rich and ready-to-go, but it’s the SensLynx Seamless SD-WAN technology that’s truly changing the connectivity game.
SensLynx Seamless SD-WAN technology
Initially, SensLynx Seamless IoT Solutions will focus on cellular carriers, master agents, telecom VARs and managed service providers (MSPs)
We all need reliable IT connections, but we all want faster speeds and broader throughput. SensLynx Seamless SD-WAN delivers both. This solution is capable of combining multiple wireless or wired networks (e.g. cable, DSL, and broadband), into one seamless and super-quick connection that’s unbreakable. Even if one goes down, the others will continue. That means customers benefit from ‘always on’ connectivity and increased productivity to boot. Traditionally, SD-WAN technology of this caliber is too cost prohibitive for SMBs, but with SensLynx’s introduction of Seamless SD-WAN, what was once unattainable is now accessible.
Rob Garry, SensLynx Co-Founder and CEO said, “I’ve worked with the most prominent wireless communications companies in the world and founded two IoT/M2M corporations in the last 20 years but, until now, I’ve never been more confident in the potential success of our new solutions.” Initially, SensLynx Seamless IoT Solutions will focus on cellular carriers, master agents, telecom VARs and managed service providers (MSPs). However, being partner-centric, SensLynx is already in development on a synergistic Channel Partner/Reseller Program to support indirect sales avenues.
“By simplifying IoT and providing SMBs with bundled, affordable solutions, worry-free wireless failover and primary connectivity, SensLynx is fulfilling its vision of bettering businesses with cost savings and efficiencies,” said Tom Maguire, COO and CMO of SensLynx.

Amer Hafiz, technical director at Nortech Control Systems, reviews the evolution of identity credentials in access control. Access control is defined as ‘the selective restriction of access to a place or other resource’. For an automatic access control system to function, it requires a means of identifying individuals to determine their access rights. The form of identification can be anything from a memorised password or PIN (personal identification number) to biometrics (measurement of a human characteristic).
Since the early days when access was granted when an authorised PIN was entered into a keypad, access control systems have evolved to support many forms of ‘physical’ credentials. Generally referred to as ‘pass cards’, these credentials have taken many forms:
Machine-readable series
Although more secure than a memorised number, a barcode can be easily copied or reproduced
Barcodes – where an identity number is printed on the card in the form of a machine-readable series of variable width bars. Although more secure than a memorised number, a barcode can be easily copied or reproduced.
Magnetic Stripe – where a magnetic stripe on the card stores an identity number within a designated track. A special magnetic card reader is used to read the number from the track.
Proximity Card – where an electronic chip on the card holds the identity number and a built-in antenna enables a compatible proximity card reader to read the identity number using radio frequency technology. The card simply needs to be held within a few centimetres of the reader.
Uniquely numbered card
Smart Card – using a similar radio technology to that of proximity cards, smart cards can hold a variety of data within the chip. The data can be read and/or written to the card using compatible readers/writers depending upon the application. For access control applications, an identity number can be stored on the card and read by a compatible access control card reader.
In each of these technologies, it is necessary to issue a uniquely numbered card (or key fob) to each authorised person. The unique number on the card serves as their identity on the access control system. Without the card, they would not be able to gain access to the restricted areas. This makes it necessary for them to keep their identity cards with them whenever they need to move around the building or installation. Recent technological advances have made the need to carry identity cards unnecessary. Two completely different approaches have been used.
High level of security
Whenever the user needs to access a restricted area, they must present themselves to a biometric reader at the access point
Biometric readers - The first was the development of Biometric readers, where the recognition of unique human characteristics such as fingerprints or retina patterns are used for identification, precluding the need for identity cards. To support these systems, authorised users must ‘enroll’ on the system, where their biometric data is read and stored in a database.
Whenever the user needs to access a restricted area, they must present themselves to a biometric reader at the access point (e.g. places their finger on a fingerprint reader). The data obtained is then compared to the database to find a match to determine their identity and check their access rights before granting entry. Although this provides a high level of security and avoids the need to issue credentials, the readers are very expensive and the process of looking up complex data with a large database can be slow and limiting.
Cloud-based server
Virtual credentials - The second alternative is to use Smartphone-based ‘virtual credentials’ to replace physical cards and fobs. A virtual credential is a unique identity code that can be securely sent from a cloud-based server to an App on the user’s smartphone. Several virtual credentials can be stored on the smartphone for different access applications.
A smartphone with its virtual credential can be used to gain access to restricted areas, making it unnecessary for the user to carry cards or fobs. As most people now carry their smartphones everywhere they go, they are far less likely to lose their credentials or forget to keep them handy. The app can present the credentials to readers using one of the smartphones built-in communication technologies such as low power blue tooth, NFC or QR Code.
High-security biometrics
The ever-increasing levels of security being required will most likely lead to a wider use of facial recognition as the main biometric credential
The technology used would depend on the capabilities of the reader and the type of smartphone being used. If Bluetooth is used, it can offer a further benefit as it can be used at distances of up to 15 metres from the reader, effectively replacing long-range, hands-free reader technologies.
In the short to medium term, identity cards will continue to be used, with contactless smartcard gradually replacing older technology proximity cards. Virtual credentials on mobile devices will become far more widespread.
The ever-increasing levels of security being required will most likely lead to a wider use of facial recognition as the main biometric credential. With advances in Bluetooth technology providing increased bandwidth, more information can be quickly retrieved from smart devices, making the combination of high-security biometrics and smartphone apps a real possibility for controlling access.

Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components brings a new level of convenience and simplicity to its VAX Access Control solution with today’s introduction of mobile credentialing. This new feature allows VAX customers to present their smartphones, instead of cards or fobs, to specialised Bluetooth-enabled VAX door readers.
Smartphone and mobile credentialing
Upon installation of a custom smartphone “wallet” app and a simple authentication process that links that app to the specific phone, users enter their personal VAX credentials into the wallet. Multiple credentials can be accommodated. No additional activation steps, such as entry of personal information or Bluetooth linking, are required. To unlock doors using the mobile credentials, users unlock their phone, access the credential within the wallet app and push the “unlock” button.
Credentials are uniquely linked to each smartphone and cannot be shared or installed across multiple devices. Android and iOS devices are supported. Strong AES encryption, combined with smartphone PINs or biometrics, make the mobile credentials even more secure than traditional smart cards. Two models of contactless door readers are available; one requires immediate proximity (1.5 inches) and one with read range of up to 15 feet. The Bluetooth readers can also accommodate traditional RFID access cards, providing flexibility to administrators wishing to offer both types of solutions to employees.
Access Control
Bret McGowan, Vicon’s V.P. of Sales and Marketing, says, “Access control is as much about convenience as it is security. If a solution isn’t easy for customers to use, doors will remain propped open and the system can’t do its job. Our new mobile solution makes it possible for employees to always have their credentials with them, even when they’re not carrying a purse or wallet. It’s another way we are using cutting-edge technology to deliver ‘advanced simplicity’ to the security marketplace.”

Securitas Services Holding UK Ltd (Securitas) has announced its acquisition of R&R Frontline Services Ltd and R&R Frontline Services UK Ltd.
As part of the Securitas Group, R&R Frontline Services Ltd and R&R Frontline Services UK Ltd will continue to deliver local, professional security services to clients and will transition to operate under the Securitas brand for the future.
With more than 70 employees, R&R Frontline Services Ltd and R&R Frontline Services UK Ltd, specialise in both static and mobile security services in Oxford, Banbury and across Oxfordshire. Their expertise and customer portfolio are an excellent complement to the existing Securitas business.
Securitas strengthens Vision 2020 strategy
Securitas is a global security services provider, specialising in protective services built on people, technology and knowledge, and operating in 58 markets worldwide.
Securitas layers six Protective Services: On-site, Mobile, Remote, Electronic Security, Fire & Safety and Corporate Risk Management to offer intelligent, value driven, total security solutions to its clients. The security of the future will rely on people, technology and knowledge"
The acquisition of R&R Frontline Services Ltd and R&R Frontline Services UK Ltd strengthens the portfolio of Securitas UK, as it continues to build its electronic alarm surveillance services and mobile security services for small and medium-sized businesses across the UK, as part of its Vision 2020 strategy.
Danny Williams, Securitas UK, Managing Director, North and South West explains “The security of the future will rely on people, technology and knowledge to ensure clients receive value driven, predictive, total security solutions. These acquisitions offer an exciting opportunity for Securitas to strengthen and expand its protective services and customer offering, creating value for clients, employees and shareholders, whilst supporting our strategy for future growth.”
Richard Powell, Managing Director, R&R Frontline Services Ltd commented, “Securitas is a leading global player in the security industry and this a great opportunity for both our officers and our clients.”

Openpath, a company on a mission to bring frictionless access and better security to our workplaces, reveals that 94% of its users now use their smartphone over a keycard to enter the office, an enviable accomplishment in an industry with shockingly low mobile adoption rates. Recognising a general lack of mobile adoption in the access control industry, Openpath launches the Mullion Smart Reader to fill out its portfolio of access control readers.
The sleek, versatile and compact design of the Mullion Smart Reader enables Openpath to further provide the most convenient form of mobile entry - hands-free, keyless, mobile access – to businesses everywhere.
Traditional access credentials
“Employees want convenience; they don’t want to go through a bunch of steps to get into their office in the morning. With the majority of our users agreeing that the simplest way to unlock their office door is to stand in front of it, we developed the hardware and software to deliver that experience to any office setting,” said Alex Kazerani, Openpath’s co-founder and CEO. “By achieving 94% mobile adoption over traditional access credentials, we have cracked the code to delivering the user experience employees want with the elegant, easy-to-install hardware businesses need.”
Openpath user analytics show that the majority of users have not only shifted to using their mobile phone for access, but also prefer to leave their smartphone in their bag or pocket to enter the office. With Openpath’s Touch access feature, employees get the convenience of an automatic door with the security of an encrypted, credential-based access system.
Hands-free entry
With the new Mullion Smart Reader, it is easier than ever for companies to install Openpath in the most convenient spot to enable hands-free entry with Touch
Faster and more convenient than opening an app or using a key or fob, Openpath Touch automatically recognises a user’s smartphone as he/she approaches, even if it's in a purse or pocket, and allows the user to enter with only a wave of their hand or a touch of the reader. With the new Mullion Smart Reader, it is easier than ever for companies to install Openpath in the most convenient spot to enable hands-free entry with Touch.
Designed to fit anywhere and bring a modern look-and-feel to locations that require a smaller reader form factor, the Mullion Reader can mount on any wall or door frame and leverage existing reader wiring. Once installed, Openpath’s technology uses Bluetooth and motion detection to authenticate the user and unlock the door. Like all Openpath Smart Readers, this new model continues to support keycards and fobs to ensure flexible options for those who want to offer various credential options.
James Segil, co-founder and President of Openpath, said: “To truly enable convenient, elegant mobile access for all, we need to make smart office access control more accessible. With the introduction of this Mullion form-factor to our existing Smart Reader line-up, we are able to provide the many design and deployment options necessary to meet the demands of any building configuration. With the Mullion Smart Reader, we ensure that any office can utilise our technology in a way that is both practical and affordable while keeping security, aesthetic and ease of use a top priority.”

Case studies

Ask a student, or pretty much anyone, what they think about “access control” and you’ll get a shrug. Conversely, all of us are enthusiastic about security and convenience. Students across Europe are discovering SMARTair wireless access control gives them both.
Adding SMARTair access control to a door involves just replacing a standard cylinder or escutcheon with a digital, smartphone- or smart-card–operated electronic lock. It’s hassle-free to make the switch to SMARTair. And with a system design focused on user experience, SMARTair takes some of the everyday pain out of student life. Wherever you fit SMARTair, it’s easy to configure access cards to enable payments in the canteen or at vending machines; for changing room locker locks; and for the photocopier or library loans. You can’t do that with a metal key.
MIFARE RFID cards At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys
At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys. CUNEF fitted escutcheons to monitor and ease access to different areas of the university for 1,600 students, without the need for expensive wired door locks. If a student loses their card, there’s no threat to campus security. A manager issues a new credential which automatically cancels the lost card — much faster than changing a lock.
When Mezzino took ownership of Rialto Court — apartments for students attending Durham University and Teesside University — they replaced a mechanical master key system with SMARTair. From the company’s point of view, the high annual tenant turnover and a need for scheduled cleaning and summer shutdown were becoming difficult to manage with physical keys. Students also reaped the benefits of their new, user-friendly access system. They have the confidence no previous resident of their flat has copied a physical key.
At Funway Academic Resort in Madrid, student rooms are also locked with SMARTair escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students each have their own safe locked with a SMARTair cabinet lock. The Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair escutcheons — and open with the same smart-card.
SMARTair Openow solution
The recent launch of the SMARTair Openow solution puts credentials on a mobile phoneThere’s more to come from SMARTair. The recent launch of the SMARTair Openow solution puts credentials on a mobile phone. With SMARTair and the Openow app, students can open their rooms and authorised doors with a smartphone. If you have your phone, you’re already carrying your keys.
Student services or facilities managers issue virtual keys over-the-air — and can revoke them whenever they choose — so there’s no need for a key-card handover meeting, at the beginning or end of term. A time-limited virtual key arrives ahead of the first day and automatically expires when it’s time to vacate your halls.
Mobile credentials
Mobile credentials will be a big hit. Student life goes on inside the handset, as much as IRL (“In Real Life”, for the uninitiated). Last year’s Deloitte Mobile Consumer Survey found a fifth of 18- to 24-year-olds even check their phone for messages in the middle of the night*.
From a security standpoint, phone-based credentials have another advantage. Checking our phones is “habitual”, “unconscious” and “repetitive”, according to one study**. We know very quickly if it is missing. How soon would you notice a missing plastic card, especially if you were enjoying yourself on a night out?
Biometric security Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door
Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door. Fingerprint, and even face and iris, scanners are commonplace on smartphones.
”Generation Z students were raised as digital natives,” says Felix Moran, SMARTair Product Manager at ASSA ABLOY. ”They expect convenience as a standard feature, not a mechanical solution used in Ancient Egypt. In Europe’s increasingly international, marketized higher education ecosystem, attracting these tech-savvy students is critical, as is keeping them satisfied with the campus experience.”
SMARTair TS1000 software
The complete SMARTair solution includes wireless escutcheons, cylinders, wall readers, locker locks and more; the intuitive SMARTair TS1000 software; and the enhanced new Openow app functionality. It works out the box and is easy to install — and even easier to operate.

Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night.
"There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki.
Mission critical communication over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications
Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications.
Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritised over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters.
Advanced communication solutions in Mining
While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market.
Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritised delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine."
But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety.
Drones in MCC over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary
In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless.
"Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki.
Market Value and Outlook
A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share.
Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems.
Softil's MCC over LTE Leadership
Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events.
Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.

A video surveillance solution manufactured by Tyco, the security products division of Johnson Controls and installed by Kings Secure Technologies, is helping deter and detect hate crime directed at worshippers who attend the Gurdwara Singh Sabha in Bradford.
HD Illustra IP network cameras
32 high definition Illustra IP network cameras from Tyco have been installed to monitor activity around the site of the Sikh place of worship, to identify anyone showing hostility towards the congregation.
The Gurdwara Singh Sabha is sadly not alone in being a place of worship that has been the victim of hate crimes. Throughout society, 2017 saw over 68,000 acts of aggression in the UK being recorded as being motivated by racial or religious prejudices.
Integrated video surveillance systems
System integrator, Kings Secure Technologies, was one of three companies invited to compete for the contract to install the new video surveillance system
System integrator, Kings Secure Technologies, was one of three companies invited to compete for the contract to install the new video surveillance system following on from a risk assessment carried out by a ‘Designing Out Crime’ officer from the West Yorkshire police. “The members of the Gurdwara wanted to take advantage of the very latest video surveillance technology in order to provide the police with high quality video evidence of any incidents or suspicious activity,” said Paul Atherton, Chief Sales & Marketing Officer at Kings Secure Technologies.
“With 32 cameras required to ensure there would be no blind spots, this size of a project might normally stretch the budget of a place of worship, even though Illustra cameras are competitively priced. Fortunately, the Gurdwara was able to successfully apply for help with the cost of installing the new system via the security funding scheme available as part of the Government Hate Crime Action Plan. This was possible because the Gurdwara had been the target of religious based hostility.”
Vandal-resistant dome cameras
The 32 installed Illustra cameras are a combination of indoor and weatherproof, vandal-resistant 2 megapixel and 3 megapixel mini-domes. With Wide Dynamic Range (WDR) and built-in IR illumination, they are designed to work effectively across a wide range of lighting conditions from bright sunlight to total darkness. As such, they are an ideal solution for when there is a need to capture faces and the vehicle number plates.
An Exacq IP04-12T-DT Network Video Recorder (NVR) with 12 Terabytes of storage onboard installed by Kings, ensures that the images captured by all 32 cameras are recorded around the clock. The IP04-12T-DT has 64 camera channels and so provides the Gurdwara with the option to install further cameras should it need to do so in the future.
Remote video monitoring using Exacq app
We have installed the cameras so that we can assist the police in prosecuting anyone who commits a hate crime"
The Gurdwara was originally a pharmaceutical production factory which has been converted into a place of worship and extended to provide space for educational and recreational activities as well functions, such as weddings. “Our Gurdwara is in almost constant use by the Sikh community in Bradford. We have installed the cameras so that we can assist the police in prosecuting anyone who commits a hate crime by being insulting or verbally aggressive towards any of our worshippers or visitors,” said Surjit Singh, a member of the Gurdwara.
“The clarity of the images captured by the Illustra cameras is impressive and this has allowed us to pass on to investigating officers’ good quality video evidence of some recent incidents. As well as being able to locally access the images stored on the NVR, we also have the added bonus of being able to use the Exacq mobile App on our smartphones or tablets, enabling us to remotely keep a close eye 24/7 on what may be happening in the immediate vicinity of the Gurdwara.”

HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitise, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system.
"HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well."
The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app
HID Trusted Tag Services
HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users.
The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair.
Proof of presence
Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting."
The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs.
Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs
Combined tag services and mobile devices
"That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected."
In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.

To combat robbery and multiple incidences of employee theft and improve profitability, the Subway in Hokes Bluff, Alabama decided it was time to install a high-quality video surveillance camera. After evaluating a number of manufacturers, Kim Jordan, president of operations, for Poore and Company Inc. DBA Subway, chose Hanwha solutions from Hanwha Techwin America.
For the Hokes Bluff restaurant, Matt Evans, Jerrett Pearson and Justin Miller of LST handled system design and installation, which included SNV6013 2 Megapixel Full HD Vandal-Resistant Microdome Cameras and SNDL6013R 2 Megapixel Full HD IP WiseNet Lite Dome Cameras.
Local, central and mobile monitoring
The flexible design of the video system enables local, central and mobile monitoring
LST downloads the video and provides long-term storage at its hosting facility. For greater reliability and redundancy, recording is also performed on site using SD card capability integrated into the cameras.
The remote viewing capability has proven to be a major benefit by putting even more ‘eyes’ on multiple locations to watch what goes on and in some cases take action to address issues.
The flexible design of the video system enables local, central and mobile monitoring, allowing authorised users to view live and recorded video at any time. This monitoring setup makes it more convenient for authorised users to view video from each of the four locations where systems have been installed to date and with plans to install systems at the remaining locations.

Airbus has expanded the range of its application portfolio for the Tactilon Dabat and partnered with new professional application developers. The aim is to better serve the communications markets in the field of public safety, transportation and healthcare. At the CCW exhibition in Berlin from 15 to 17 May 2018, Airbus is showcasing selected applications for professionals that combine multimedia real-time functions with highest standards of security.
“The apps that we showcase at the CCW work in various areas, whether it is industry, public safety or the health sector. They meet specific customer needs and requirements for different regions in the world,” explains Rahim Zaknoun, Head of Innovation & Developer Ecosystem at Secure Land Communications of Airbus. "We selected these apps for our customers and created them for the hybrid Tactilon Dabat.”
For instance, the digitalised Triage application from Exomi helps first responders (paramedics) to send complex health data of patients from the ambulance on the scene to the hospital. The delivery of the constantly updated information is standardised and reliable.
It can easily be shared not only via the Tactilon Dabat, the Android smartphone and Tetra radio in one device, but also on other platforms in control rooms or in the field. Thus, the application streamlines processes and accelerates a more accurate treatment for the patients.
Commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display based on a map configuration with GPS
Live video sharing platform
The application ES-Core features a live video sharing function that is secure and supports external video sources, such as from drones or vehicles. Even with little radio coverage the transmission is of high quality.
Moreover, footing can be stored as evidence or for the purpose of analysis. “Clearly, this is a tool for police officers. However, paramedics work increasingly with this app on the scene and companies can also master situations by transmitting a live video stream,” says Rahim Zaknoun.
Another application can fill frequently the gap of non-existing radio coverage in many public buildings: the ‘indoor positioning’ system for large sites creates a real-time situational awareness when communication groups move around in- and outdoors.
Based on a map configuration with a GPS function, commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display. The application serves especially security personnel in airports, train stations, or event sites: no configuration is needed, a seamless in- and outdoor positioning is put in place and the app works without broadband connection.
Track Worker Protection
In order to save lives of railway track workers and minimise the risk of collisions, the company Intelligence on Wheels invented the app ‘Track Worker Protection’. This application with a clear map display receives permanent train location updates.
Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps"
The signals will be sent from the train operator’s control room and the train itself, which is equipped with a Train Collision Avoidance System. Critical scenarios can now be easily managed with the Tactilon Dabat and the ‘track worker protection’.
“Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps,” says Rahim Zaknoun. “It enables the innovation and professional application development on the top of Airbus’ existing communication technology. It boosts our strong developer ecosystem."